Ethical Hacking 02: Web Cookies Stealing Attack

file name, file extensions, computer file, stealing attack, cookiestealing, microsoft windows, companion viruses, hackers been, been utilizing, utilizing computer



Hackers have been utilizing computer file name cookies stealing attack to obtain us to execute suspicious code since the start of viruses and worms example.

For examples:

Included naming the computer file something that would encourage unsuspecting victims to click the file, like "IvanaAlawiNudePics" and using multiple file extensions, such as "IvanaAlawiNudePics.zip.exe" similar to ILOVEYOU virus created by Onel De Guzman, "LOVE-LETTER-FOR-YOU.TXT.vbs" worm virus.

Until this day, Microsoft Windows and other operating systems readily hide file extensions, which will make IvanaAlawiNudePics.gif.exe look alike IvanaAlawiNudePics.gif!

Years ago, malware virus programs known as "twins", "spawners" or "companion viruses" relied on a little-known feature of Disk Operating System (DOS/Microsoft Windows), where even if you typed in the file name Start.exe, Windows would look for and, if found, executeStart.com instead. Companion viruses would look for  all the .exe files on your hard drive and create a virus with the same name as the EXE, but with the file extensions .com

This has long since been fixed by Microsoft since Windows 7 to 8, but its discovery and exploitation by early hackers laid the groundwork for inventive ways to hide viruses that continue to evolve on Windows 10.

Among the more complex record renaming stunts as of now, use is the utilization of Unicode characters that influence the result of the user's file name are introduced.

For example, the Unicode character (U+202E), called the right to left override, can fool many systems into displaying a file actually named IvanaAlawiNudePics.exe as IvanaAlawiNudePics.avi.


Hacking Tips

Whenever possible, make sure you are very familiar of the file extensions, original file name, and file path before executing it.